The smooth case

Author(s):  
Ehud Hrushovski ◽  
François Loeser

This chapter examines the simplifications occurring in the proof of the main theorem in the smooth case. It begins by stating the theorem about the existence of an F-definable homotopy h : I × unit vector X → unit vector X and the properties for h. It then presents the proof, which depends on two lemmas. The first recaps the proof of Theorem 11.1.1, but on a Zariski dense open set V₀ only. The second uses smoothness to enable a stronger form of inflation, serving to move into V₀. The chapter also considers the birational character of the definable homotopy type in Remark 12.2.4 concerning a birational invariant.

2005 ◽  
Vol 48 (4) ◽  
pp. 481-499
Author(s):  
D. Azagra ◽  
M. Fabian ◽  
M. Jiménez-Sevilla

AbstractWe establish sufficient conditions on the shape of a set A included in the space (X, Y ) of the n-linear symmetric mappings between Banach spaces X and Y , to ensure the existence of a Cn-smooth mapping f: X → Y, with bounded support, and such that f(n)(X) = A, provided that X admits a Cn-smooth bump with bounded n-th derivative and dens X = dens ℒn(X, Y ). For instance, when X is infinite-dimensional, every bounded connected and open set U containing the origin is the range of the n-th derivative of such amapping. The same holds true for the closure of U, provided that every point in the boundary of U is the end point of a path within U. In the finite-dimensional case, more restrictive conditions are required. We also study the Fréchet smooth case for mappings from ℝn to a separable infinite-dimensional Banach space and the Gâteaux smooth case for mappings defined on a separable infinite-dimensional Banach space and with values in a separable Banach space.


It was shown in two earlier papers that, if u ( x, t ) = u ( x 1 , x 2 , x 3 , t ) satisfies the wave equation in the exterior of some fixed sphere r = a and vanishes for t ≤ r , then ru ( rξ , r + τ ) ~ f ( ξ, τ ) as r →∞, provided that ξ is a fixed unit vector and t — r = τ remains bounded. The function f was called the radiation field of the pulse solution u . The problem of determining u when f is given was then considered: this is called the radiation field problem in the present paper. It was proved that (i) the radiation field determines the pulse solution uniquely, and (ii) that if two radiation fields f 1 and f 2 coincide, for all τ ≥ 0, in any open set of the unit sphere, then f 1 = f 2 . In the present paper new proofs of these results are given, by means of a simple transformation of variables and an appeal to Holmgren’s uniqueness theorem. The same method is then applied to self-adjoint linear second order equations of normal hyperbolic type, which can be considered as wave equation in a curved spacetime. Radiation fields are defined by means of a family of characteristics that represent outgoing wave fronts. It is shown that if the metric, expressed in coordinates adapted to these characteristics, satisfies certain conditions at infinity (similar to those that have been used in the theory of gravitational waves by Bondi, van den Berg & Metzner, and Sachs), then radiation fields exist. It is also shown that the radiation field determines the associated pulse solution uniquely, and that radiation fields form a coherent family of functions with unique continuation properties.


Author(s):  
Ehud Hrushovski ◽  
François Loeser

This chapter includes some additional material on homotopies. In particular, for a smooth variety V, there exists an “inflation” homotopy, taking a simple point to the generic type of a small neighborhood of that point. This homotopy has an image that is properly a subset of unit vector V, and cannot be understood directly in terms of definable subsets of V. The image of this homotopy retraction has the merit of being contained in unit vector U for any dense Zariski open subset U of V. The chapter also proves the continuity of functions and homotopies using continuity criteria and constructs inflation homotopies before proving GAGA type results for connectedness. Additional results regarding the Zariski topology are given.


Author(s):  
Ehud Hrushovski ◽  
François Loeser

This chapter introduces the concept of stable completion and provides a concrete representation of unit vector Mathematical Double-Struck Capital A superscript n in terms of spaces of semi-lattices, with particular emphasis on the frontier between the definable and the topological categories. It begins by constructing a topological embedding of unit vector Mathematical Double-Struck Capital A superscript n into the inverse limit of a system of spaces of semi-lattices L(Hsubscript d) endowed with the linear topology, where Hsubscript d are finite-dimensional vector spaces. The description is extended to the projective setting. The linear topology is then related to the one induced by the finite level morphism L(Hsubscript d). The chapter also considers the condition that if a definable set in L(Hsubscript d) is an intersection of relatively compact sets, then it is itself relatively compact.


2020 ◽  
Vol 9 (11) ◽  
pp. 9353-9360
Author(s):  
G. Selvi ◽  
I. Rajasekaran

This paper deals with the concepts of semi generalized closed sets in strong generalized topological spaces such as $sg^{\star \star}_\mu$-closed set, $sg^{\star \star}_\mu$-open set, $g^{\star \star}_\mu$-closed set, $g^{\star \star}_\mu$-open set and studied some of its basic properties included with $sg^{\star \star}_\mu$-continuous maps, $sg^{\star \star}_\mu$-irresolute maps and $T_\frac{1}{2}$-space in strong generalized topological spaces.


2021 ◽  
Vol 22 (1) ◽  
pp. 53-68
Author(s):  
Guenter Knieps

5G attains the role of a GPT for an open set of downstream IoT applications in various network industries and within the app economy more generally. Traditionally, sector coupling has been a rather narrow concept focusing on the horizontal synergies of urban system integration in terms of transport, energy, and waste systems, or else the creation of new intermodal markets. The transition toward 5G has fundamentally changed the framing of sector coupling in network industries by underscoring the relevance of differentiating between horizontal and vertical sector coupling. Due to the fixed mobile convergence and the large open set of complementary use cases, 5G has taken on the characteristics of a generalized purpose technology (GPT) in its role as the enabler of a large variety of smart network applications. Due to this vertical relationship, characterized by pervasiveness and innovational complementarities between upstream 5G networks and downstream application sectors, vertical sector coupling between the provider of an upstream GPT and different downstream application industries has acquired particular relevance. In contrast to horizontal sector coupling among different application sectors, the driver of vertical sector coupling is that each of the heterogeneous application sectors requires a critical input from the upstream 5G network provider and combines this with its own downstream technology. Of particular relevance for vertical sector coupling are the innovational complementarities between upstream GPT and downstream application sectors. The focus on vertical sector coupling also has important policy implications. Although the evolution of 5G networks strongly depends on the entrepreneurial, market-driven activities of broadband network operators and application service providers, the future of 5G as a GPT is heavily contingent on the role of frequency management authorities and European regulatory policy with regard to data privacy and security regulations.


Author(s):  
Judit Abardia-Evéquoz ◽  
Andreas Bernig

AbstractWe show the existence of additive kinematic formulas for general flag area measures, which generalizes a recent result by Wannerer. Building on previous work by the second named author, we introduce an algebraic framework to compute these formulas explicitly. This is carried out in detail in the case of the incomplete flag manifold consisting of all $$(p+1)$$ ( p + 1 ) -planes containing a unit vector.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Clara Borrelli ◽  
Paolo Bestagini ◽  
Fabio Antonacci ◽  
Augusto Sarti ◽  
Stefano Tubaro

AbstractSeveral methods for synthetic audio speech generation have been developed in the literature through the years. With the great technological advances brought by deep learning, many novel synthetic speech techniques achieving incredible realistic results have been recently proposed. As these methods generate convincing fake human voices, they can be used in a malicious way to negatively impact on today’s society (e.g., people impersonation, fake news spreading, opinion formation). For this reason, the ability of detecting whether a speech recording is synthetic or pristine is becoming an urgent necessity. In this work, we develop a synthetic speech detector. This takes as input an audio recording, extracts a series of hand-crafted features motivated by the speech-processing literature, and classify them in either closed-set or open-set. The proposed detector is validated on a publicly available dataset consisting of 17 synthetic speech generation algorithms ranging from old fashioned vocoders to modern deep learning solutions. Results show that the proposed method outperforms recently proposed detectors in the forensics literature.


2021 ◽  
Vol 11 (11) ◽  
pp. 5213
Author(s):  
Chin-Shiuh Shieh ◽  
Wan-Wei Lin ◽  
Thanh-Tuan Nguyen ◽  
Chi-Hong Chen ◽  
Mong-Fong Horng ◽  
...  

DDoS (Distributed Denial of Service) attacks have become a pressing threat to the security and integrity of computer networks and information systems, which are indispensable infrastructures of modern times. The detection of DDoS attacks is a challenging issue before any mitigation measures can be taken. ML/DL (Machine Learning/Deep Learning) has been applied to the detection of DDoS attacks with satisfactory achievement. However, full-scale success is still beyond reach due to an inherent problem with ML/DL-based systems—the so-called Open Set Recognition (OSR) problem. This is a problem where an ML/DL-based system fails to deal with new instances not drawn from the distribution model of the training data. This problem is particularly profound in detecting DDoS attacks since DDoS attacks’ technology keeps evolving and has changing traffic characteristics. This study investigates the impact of the OSR problem on the detection of DDoS attacks. In response to this problem, we propose a new DDoS detection framework featuring Bi-Directional Long Short-Term Memory (BI-LSTM), a Gaussian Mixture Model (GMM), and incremental learning. Unknown traffic captured by the GMM are subject to discrimination and labeling by traffic engineers, and then fed back to the framework as additional training samples. Using the data sets CIC-IDS2017 and CIC-DDoS2019 for training, testing, and evaluation, experiment results show that the proposed BI-LSTM-GMM can achieve recall, precision, and accuracy up to 94%. Experiments reveal that the proposed framework can be a promising solution to the detection of unknown DDoS attacks.


2010 ◽  
Vol 2010 ◽  
pp. 1-10 ◽  
Author(s):  
Weixiang Wang ◽  
Youlin Shang ◽  
Ying Zhang

A filled function approach is proposed for solving a non-smooth unconstrained global optimization problem. First, the definition of filled function in Zhang (2009) for smooth global optimization is extended to non-smooth case and a new one is put forwarded. Then, a novel filled function is proposed for non-smooth the global optimization and a corresponding non-smooth algorithm based on the filled function is designed. At last, a numerical test is made. The computational results demonstrate that the proposed approach is effcient and reliable.


Sign in / Sign up

Export Citation Format

Share Document